Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 109, Pages 1–8https://doi.org/10.1145/3538969.3544478In incident management, response and recovery actions are designed to effectively mitigate ongoing or future cyberattacks. A security playbook consists of a pipeline of instructions to document necessary response and recovery actions to deal with a ...
- research-articleAugust 2022
Data Acquisition on a Large Darknet Marketplace
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 53, Pages 1–6https://doi.org/10.1145/3538969.3544472Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods. Previous research on marketplaces ranged from analyses of type, availability and quality of goods to methods for identifying users. ...
- research-articleAugust 2022
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 44, Pages 1–8https://doi.org/10.1145/3538969.3544468This paper presents the general goals of Horizon 2020 project UNCOVER, whose overall purpose is to close the gap between academic work and operational needs in the fields of data-hiding. While digital data-hiding is a relatively new area of research, ...
- research-articleAugust 2022
Towards Image Hashing Robust Against Cropping and Rotation
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 55, Pages 1–7https://doi.org/10.1145/3538969.3544461Image recognition is an important mechanism used in various scenarios. In the context of multimedia forensics, its most significant task is to automatically detect already known child and adolescent pornography in a large set of images. For this purpose,...
- research-articleAugust 2022
Using Telegram as a carrier for image steganography: Analysing Telegrams API limits
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 49, Pages 1–8https://doi.org/10.1145/3538969.3544440Telegram is a messaging platform with millions of users per month. For this reason, it is a possible vector for steganographic messages. We investigate the feasibility of using Telegram as a messenger service for images with steganographic content, ...
-
- research-articleAugust 2022
Revealing MageCart-like Threats in Favicons via Artificial Intelligence
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 45, Pages 1–7https://doi.org/10.1145/3538969.3544437Modern malware increasingly takes advantage of information hiding to avoid detection, spread infections, and obfuscate code. A major offensive strategy exploits steganography to conceal scripts or URLs, which can be used to steal credentials or retrieve ...
- research-articleAugust 2022
Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 58, Pages 1–6https://doi.org/10.1145/3538969.3544428Currently, machine learning sees growing adoption in numerous domains, including critical applications, like cybersecurity. However, to fully enjoy the benefits of artificial intelligence the end-user has some high barriers to entry to circumnavigate. ...
- research-articleAugust 2022
Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 51, Pages 1–8https://doi.org/10.1145/3538969.3544427In view of the strong increase of targeted attacks on industrial control systems (ICS) of manufacturies and critical infrastructures, it can be noticed that for the concealment of communication, steganographic information hiding techniques become ...
- research-articleAugust 2022
A Methodology for enhancing Emergency Situational Awareness through Social Media
- Antonios Karteris,
- Georgios Tzanos,
- Lazaros Papadopoulos,
- Konstantinos Demestichas,
- Dimitrios Soudris,
- Juliette Pauline Philibert,
- Carlos López Gómez
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 130, Pages 1–7https://doi.org/10.1145/3538969.3544418Social media are a valuable source of information during emergency situations. First responders and rescue teams can further improve their situation awareness and be able to act more effectively, when using information available in the form of social ...
- research-articleAugust 2022
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 127, Pages 1–10https://doi.org/10.1145/3538969.3544415Modern software development heavily relies on a multitude of externally – often also open source – developed components that constitute a so-called Software Supply Chain. Over the last few years a rise of trojanized (i.e., maliciously manipulated) ...
- research-articleAugust 2022
A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 42, Pages 1–11https://doi.org/10.1145/3538969.3544414The ecosystem for automated offensive security tools has grown in recent years. As more tools automate offensive security techniques via Artificial Intelligence (AI) and Machine Learning (ML), it may result in vulnerabilities due to adversarial attacks. ...
- research-articleAugust 2022
We cannot trust in you: a study about the dissonance among anti-malware engines.
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 65, Pages 1–13https://doi.org/10.1145/3538969.3544411The impressive volume of malware circulating today, the increase in its sophistication, its unpredictability and evasiveness pose new problems to face in the deployment of effective defence systems. It is proven today that no single anti-malware ...
- research-articleAugust 2022
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation
- Sara Ricci,
- Marek Sikora,
- Simon Parker,
- Imre Lendak,
- Yianna Danidou,
- Argyro Chatzopoulou,
- Remi Badonnel,
- Donatas Alksnys
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 84, Pages 1–10https://doi.org/10.1145/3538969.3543821This article presents a new free web-based application, the Cybersecurity Job Ads Analyzer, which has been created to collect and analyse job adverts using a machine learning algorithm. This algorithm enables the detection of the skills required in ...
- research-articleAugust 2022
Introducing Quantum Computing in Mobile Malware Detection
- Giovanni Ciaramella,
- Giacomo Iadarola,
- Francesco Mercaldo,
- Marco Storto,
- Antonella Santone,
- Fabio Martinelli
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 88, Pages 1–8https://doi.org/10.1145/3538969.3543816Mobile malware are increasing their complexity to be able to evade the current detection mechanism by gathering our sensitive and private information. For this reason, an active research field is represented by malware detection, with a great effort in ...
- research-articleAugust 2022
Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 117, Pages 1–9https://doi.org/10.1145/3538969.3543810These days more companies are shifting towards using cloud environments to provide their services to their client. While it is easy to set up a cloud environment, it is equally important to monitor the system’s runtime behaviour and identify anomalous ...
- research-articleAugust 2022
Explainability-based Debugging of Machine Learning for Vulnerability Discovery
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 113, Pages 1–8https://doi.org/10.1145/3538969.3543809Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have shown that, despite its power, this ...
- research-articleAugust 2022
Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 143, Pages 1–7https://doi.org/10.1145/3538969.3543796The importance of automated intrusion detection systems, not only in network infrastructures, but also in critical and industrial infrastructures is becoming more evident with the significant increase of cyber-attacks targeting such infrastructures. The ...
- research-articleAugust 2022
Multi-label Classification of Cybersecurity Text with Distant Supervision
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 93, Pages 1–9https://doi.org/10.1145/3538969.3543795Detailed analysis of cybersecurity intelligence in various data is essential to counter the recent advanced and complex evolution of cyber security attacks and threats. In particular, highly sophisticated learning models are required to classify ...
- research-articleAugust 2022
Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 158, Pages 1–7https://doi.org/10.1145/3538969.3543793Forensic watermarking enables the tracing of digital pirates that leak copyright-protected multimedia. To prevent a negative impact on the video quality or bit rate, rate-distortion-preserving watermarking exists, which represents a watermark as ...
- research-articleAugust 2022
Deep Reinforcement Learning-Based Defense Strategy Selection
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 110, Pages 1–11https://doi.org/10.1145/3538969.3543789Deception and Moving Target Defense techniques are two types of approaches that aim to increase the cost of the attacks by providing false information or uncertainty to the attacker’s perception. Given the growing number of these strategies and the fact ...